CA2501702A1 - Information picker - Google Patents

Information picker Download PDF

Info

Publication number
CA2501702A1
CA2501702A1 CA002501702A CA2501702A CA2501702A1 CA 2501702 A1 CA2501702 A1 CA 2501702A1 CA 002501702 A CA002501702 A CA 002501702A CA 2501702 A CA2501702 A CA 2501702A CA 2501702 A1 CA2501702 A1 CA 2501702A1
Authority
CA
Canada
Prior art keywords
contact
application
contact information
persona
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002501702A
Other languages
French (fr)
Inventor
Melissa W. Dunn
Jonathan D. Perlow
Vivien Park
Kim Cameron
John-Anthony Owens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2501702A1 publication Critical patent/CA2501702A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism

Abstract

A user is able to informatively control how contact information is provided to one or more applications through the use of a persona interface object (210), corresponding personas (220) and contact information, and an information picker interface (300). The persona interface (210) identifies available personas (220), each persona (220) having different contact information. The user can select a persona (220) to use in response to an applications request for information. The personas (220) can be modified and developed through the information picker interface (300), which can also be used to inform the user about what information is being requested and how it will be used.

Description

INFORMATION PICKER
The Field of the Invention The present invention relates to user interface menus in computers and electronic devices and, more particularly, to methods, systems, and computer program products for controlling how contact information is provided to computer applications.
Background and Relevant Art .
The term "contact," as described herein, generally refers to any person, group, organization, business, household, or other type of identifiable entity. The term "contact information," as defined herein, generally refers to any information that corresponds to a contact and that may be considered relevant for ideatifyin~
contacting, accessing, corresponding or communicating with the contact. In the ~5 context of the present application, contact information is used by an application to perform a desired function, such as, for example, sending an email, initiating a telephone call, accessing a website, initiating a gaming session, perfonuing a financial transaction, and so forth. Non-limiting examples of contact information i~lude names, aliases, telephone numbers, email addresses, home addresses, instant 2o messaging (Ilk addresses, and web addresses. Contact information can also refer to other types of information such as the status of a contact. For example, information indicating a contact is currently online, or on a telephone line may also be broadly considered as contact information.
Many applications require, access, transmit, or otherwise utilize contact zs information. Examples of some applications that utilize contact information include exnail applications, network gaming a~lications, instant messaging applications, telephone and telephony applications, Internet applications, financial applications, word processing applications, and business managem~t applications.
Applications that utilize contact information typically provide interfaces or 3o menus for entering desired contact information within one or more fields.
For example, an email interface will typically include fields for receiving the email addresses of the intended email recipients. Contact information caa also be gathered without the ~ user's express knowledge. For example, with regard to the email application, contact information corresponding to the sender (i.e., the sender's name, pail address, etc.) can be gathered behind the scenes, without requiring user input and sometimes even without the user's knowledge.
The contact information that is gathered by an application can then be published or otherwise used and sometimes without the user's express knowledge or consent. This can be very undesirable, particularly when the user has no intent for their contact information to be gathered at all.
Allowing applications to automatically gather contact information about a user can also be problematic, even when a user has provided implied or actual consent to the application to gather their information. For example, if a single computing system is shared by multiple people, the computing system may have access to different contact information for each of the people that share the computing system, thereby increasing the possible that an application can obtain the wrong contact information for any particular person using the computing syst~ at any particular time.
Yet another problem in the art is that existing applications typically do not expressly notify the user what the gathered contact information is going to be used for. This can make it di~cult for a user to decide if they are willing to provide the requested contact information. Even if a user could evtatoally find such information by navigating to related web pages or to help menus that are associated with the application, this is undesirable, particularly if the user does not immediately know where to begin looking for such information. Accordingly, users typically have to make uninformed decisions about whether they want to provide their contact information or not.
Yet another problem in the art is that even if a user does consent to the gathering and use of their contact information, the computing system may not know which contact information to gather about a user. In particalar, a user may have different sets of contact information or 'personas' that correspond to different environments in which they Hve. For example, a user may have a family persona, a 3o school persona, a friends persona, a work persona, a recreational persona, and so forth, each corresponding to different aliases, addresses (e.g., physical/e~nail), telephone numbers, and so forth. However, because an application may not know which inforanation the user would prefer to have gathered, the wrong infom~ation may inadvertently be gathered and published or otherwise used by the application.

The present invention is dirxted to improved methods, systems, and corresponding computer program products and interfaces for controlling how contact information is provided to one or more requesting applications and, more particular, for enabling a user to infonaatively control which of their contact information is gathered by an application.
1o According to one aspect of the invention, an interface object that identifies difi'ezent contact personas corresponding to a user is displayed for user selection why an application requests contact information about the user. The user can then select the appropriate contact persona that they are willing to have corresponding and relevaat information gathered about. For example, the list of personas that may be is selected from can include a business persona, a personal persona, an e-commerce persona, an anonymous persona, or any other persona that has been developed and that the application c~ be pmovided access to. The contact i~nformatjon con~ponding to the selected persona can then be provided to the requesting application, as selectively determined by the user.
2o Another interface can also be provided to enable a user to view eomesponding information that is associated with the various personas. In some embodiments, this information picker interface defaults to requested persona information that is intended to be sent to the calling application. The user can then choose to send the information or different information, rather than the default information, by using the information 25 picker.
The information picker interface can be accessed by special request or whenever ~ application seeks information about a user. The contact information that is displayed by the information picker can exluwstively display all of the contact information that is associated with a given persona, or, alternatively, only the contact 3o information that is being requested at a particular moment by an application, or any combination thereofi The information picker can also be configured to display ~d _ 4 provide access to the privacy policies of the applications that seek information about the user and that explain how the user's contact information will be used, thereby enabling the user to make informed decisions about what contact information the applications will be granted access to.
The present inv~tion can be practiced to overcome some of the known problems in the art. In particular, the interfaces that are provided by the present application and their use can enable a user to be ~ of an applications request for contact information and can provide a user some control over what information is gathered and how it is used by requesting applications.
1o Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the ~5 present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth BRIEF DESCRIPTION OF THE DRAWllVGS
In order to describe the matmer in which the above-recited and other 2o advantages and features of the invention can be obtained, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings.
Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be 25 described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Figure 1 is a flowchart illustrating a method and corresponding acts for controlling how contact information is provided to applications, according to one embodiment of the invention.

Figure 2A illustrates one embodiment of an email application interface that is displayed with an interface object that can be utilized to identify various personas for which a user's contact information may be gathered Figure 2B illustrates one embodiment of the email application interface from 5 Figure ZA in which the interface object has been selected and displays various personas that can be selxted to control which contact information about a user may be gathered by the email application.
Figure 3 illustrates one embodiment of the email application interface from Figures 2A and 2B along with an information picker interface that is displaying l0 various contact information corresponding to a user's business persona.
Figure 4 illustrates one embodiment of a computing system that can be utilized to practice aspects of the invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODiIVViENTS
The present invention extends to methods, systems and computes pmgram products for controlling how contact information is organized and presented to applications for use.
The term "application," as used herein, can include interfaces, modules, code and computer-executable instructions, that can be rues by a user in order to complete some action, including, but not limited to web-based applications. This of course, 2o includes applications hosted locally by the user's computing system, as well as applications hosted by remote systems.
The team "contact information," as used herein, and which is defined above in more detail, generally includes information that corresponds to a contact and that may be considered relevant for identifying, contacting, accessing, corresponding or communicating with the contact. Contact information can also be defined as any information corresponding to a person.
The term "persona," which is used at times herein interchangeably with the term "profile," is generally defined as a particular way a person can be described or identified by contact information. Accordingly, each person may have, although not 3o necessarily, multiple personas that are -each associated with difi'erent contact information about a person. Examples of personas can include, but are not limited to, a family persona, a school persona, a friends persona, a work persona, a recreational persona, a business persona, an e-commerce persona, an anonymous persona, and a personal persona. The various personas and their corresponding contact information can be stored in tables, indexes and other data structures that are made available to the user's computing system, In various embodiments described herein, interfaces are used to control association of and access to contact information. These interfaces can be created, modified and used through computer software components, which are sometimes referred to herein as computer-executable instructions or computing modules.
to As described herein, a programming interface (or more simply, an interface) may be viewed as any mechanism, process, protocol for enabling one or more segments) of code to communicate with or access the functionality provided by one or more other segments) of code. Alternatively, a programming interface may be viewed as one or more mechanism(s), method(s), function call(s), module(s), is object(s), ere. of a component of a system capable of communicative coupling to one or more mcchanism(s), method(s~ function call(s), module(s), etc. of other component(s). The term "segment of code" in the preceding sentence is intended to include ane or more instructions or lines of code, and includes, e.g., code modules, objects, subroutines, functions, and so asr, regardless of the terminology applied or 2o whether the code segments are separately compiled, or whether the code segments are provided as source, intermediate, or object code, whether the code segments are utilized in a runtime system or prucGSS, or whether they are located on the same or different machines or distributed across multiple machines, or whether the functionality represented by the segments of code are implemented wholly in 2s software, wholly in hardware, or a combination of hardware and software.
Accordingly, it will be appreciated that the embodiments of the invention caa include special purpose and general purpose computing devices inchtding various compute software and hardware that can be usod to enable the interfaces descn'bed herein. The embodiments within the scope of the present invention can also include 3o computer-readable media for carrying or having the computer-executable instructions _ 7 or data structures stored thereon that comprise the interfaces and the code for using and modifying them.
It will be appreciated that the computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer, .
including, but not limited to mobile communications devices. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or aay other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data 1o structures and which can be accessed by a general purpose or special purpose computer. The computer-ex~utable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions, such as the acts aad steps described below.
is When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer or mobile communications device, the computer/device properly views the connection as a computer-readable medium.
Thus, any such connection is properly termed a computer-readable medium.
2o Combinations of the above should also be included within the scope of computer-readable media.
CONTROLLING ACCESS TO CONTACT INFORMATION
Figure 1 illustrates a flowchart of a method having various acts for controlling how contact information is provided to requesting applications according to one 25 embodiment of the invention. The first illustrated act includes detecting a request for contact information from an application (act 110). This caa be accomplished, for example, by monitoring requests that are made to a general contact information repository or to any number of specific application contact information registries.
Various applications can request different types of contact information. For 3o example, the hosting application can request telephone numbers, email addresses, physical address, names, personal identification numbers, credit card numbers, and so forth.
According to one embodiment, however, the applications only request the contact information is required by the applications to perform an intended function, despite the availability of other contact information. For example, an email application may only require a name or alias and an email address. In other embodiments, however, applications may also request additional information that is not necessarily required, but that the application is configured to gathex nonetheless.
For example, an Internet application may not need a user's telephone number, but 1o may request it anyway, so that it can later be sold to a telcrnarketing company. In such circumstances, a user might find it desirable to prevent the application from gathering unnecessary information. In such cases, the methods and interfaces of the invention can be utilized to prevent the application from obtaining contact information that is not require by the application.
In particular, the methods of the invention can include the act for deternuning whether an application has authorization to access the requested information (act 120). This can be based in part on whether the information is needed by the application and how it will be used. In one embodiment, for example, shown and described below in more detail with reference to Figure 3, a user can be informed 2o about the application's intended use for the contact information, as well as the types of contact information that are being requested by the user. Upon being informed, the user can then control whether the application is granted authorization to access the requested information or may instead choose to pick the information that is presented to the application.
According to another embodiment, authorization is automatically performed through the use of access control lists (ACL's) that exist on the user's computing system. The ACL entry specifically granting access permission to the information requested by the application.
Authorization can also be determined inherently through the interfaces that are 3o described herein, such as, for ale, by determining whether the contact information requested by the application corresponds with the information that is already associated with one or more personas that the user has selected to be made available to the application, either at the time the information is requested or at an earlier time.
If it is determined that the application has authorization to access the information, then the requested information is provided (act 130). However, if authorization has not already been graated to the application, and even in some cases where it has, the user can still select the desired contact information or use a persona to provide the application with appropriate information.
A persona generally comprises contact information that can be used to to describe a particular profile of a person. For example, a business persona may include a person's work address, work telephone number, work emsil address, a work alias or title, and so forth. Whereas, a personal persona may include a personal cell phone number, private email address, home address, and so forth.
As mentioned above, a user can have any number of personas. The personas can also be created or modified by the user, as described below, or implicitly defined by the user's interaction with various applications. For example, if an application has previously asked for a~ obtained a user's home telephone number and address, the modules of the invention can enable such information to be tracked and automatically used to develop a cornesponding profile or persona for the user.
2o To help the user select an appropriate persona, the user's computing system or other computing system that has access to the user's contact information and corresponding personas proceeds to identify the available contact personas (act 150).
In some cases, the user may not have any personas that are currently developed or that can be identified. In these circumstances, the identification of available contact personas can include the generation of default personas, even though the contact information provided within the default personas is wrong or missing.
Thereafter, the user can modify the contact information that is associated with the various personas through an interface, as described below in more detail with reference to Figure 3.
3o Identification of the available personas (act 150) can also include the process of determining who the logged on user is. If no one is presently logged onto the computing system, such that it is being used anonymously, the actual user may be prompted to log on or to otherwise identify themselves so that the user's personas can be identified. In other embodiments, the identity of the user is obtained from the application that is requesting the contact in formation aad that has in some way 5 indicated who the user is. In yet other embodiments, any number of the available personas that can be accessed by a computing systan are identified, even though they may not all correspond to the person for whom contact information is being requested.
Once the contact personas have been identified, they are presented to a user for selection, thereby enabling the user to select or otherwise identify the appropriate 1o persona for which corresponding contact information will be provided to the requesting application (act 150).
In one embodiment, the available personas are pry through an interface object that is integrated within the interface of the requesting application.
For example, in Figure 2A, an email application interface 200 is shown to have an integrated profile menu object 210 that can be selected to display one or more of the identified personas. Integrating the interface object can be performed, for example, by actually modifying the application's Graphical User Interface (GUI) or by simply overlaying the GUI with the interface object.
Although the interface object can be integrated within the interfaces of 2o existing applications, it will be appreciated that in other embodiments, the interface object can also comprise a separate stand alone interface, menu, icon or other object that is presented to the user independently of the application's interface.
Figure 2B illustrates one embodiment in which the profile menu object 210 has been selected and expanded to reflect a list 220 of four distinct personas, a business persona, a personal persona, an anonymous persona and an e-commerce persona. As described above, each of these personas can be associated with corresponding contact information that the user decides is relevant and appropriate for different applications.
In other embodiments, the user can also be presented with additional personas 3o that have been identified and that might correspond with different people, such as for example, when the user has not yet been identified by the computing system though a logging on procedure.
To protect contact information that may be confidential, such as, for example, personal identification numbers, social security numbers, bank account numbers, etc., security modules can also be provided to prevent a user from accessing or utilizing the personas of different users unless they have been authorized to do so. Such authorization may require the user to log in or to provide other certain information to verify their identity.
In the present example, an email application has requested contact information to about the user that will be included in metadata and headers for outgoing mail. The user may not have been made aware of this, but upon seeing the profile interface object 210, the user can be informed that the application is seeking certain information. To provide even more notice to the user, the interface object can be displayed in an even more notorious or evident manner.
The user can be fiuther informed about the information the application is ' seeking through a separate interface, such as, for example, the interface 300 shown in Figure 3, which can be launched fiom the interface objat 210 or that can be automatically launched when the applications requests information.
It can be useful to notify the user of an application's request for information 2o because some requests are not explicitly made to the user, but instead are made to the user's computing system without the user's express knowledge. Likewise, some requests for information are made at times that predate the user's ultimate use of an application; such that a reminder to~ the user of the application's request for information can be useful.
Turning now to Figure 3, one embodiment of an interface 300 is provided that can be used to pick or otherwise select information that is associated with a profile.
This interface 300 can be launched automatically in response to a request for information, or, alternatively, in response to a specific request by the user.
For example, the user can specifically request the interface at any time to develop and 3o modify their corresponding personas. A- user can also request the interface indirectly by selecting a persona finm the interface object 210, as described above.

__ _ _ __ ___ _ ___.
., For example, in the present embodiment, the user has selected the business persona from the fist of available personas 220, This selection has caused the business profile or perr;ona to be displayed in the information picker interface 300.
The business profile currently includes fields for a business name (310), small address (320), physical address (330), and phone number (340), each of which can be populated with the appropriate information. This information can be added at any time, prior to the application requesting the information, or after. This information can also be modified by a user at the interface 300.
The types of information that are presented in the interface 300 can be limited to the specific information being requested by the application or, more broadly, can include all types of related contact information that is associated with the user's ~~8 P~~.
The interface can also include additional information, such as the privacy value proposition 350 of the application and/or of the application's owners that will inform the user what the contact information will be used for. This privacy and use information can be directly included is the interfere 300, or, alternatively, it can be linked to from one or more objects, such as a hyperlink, that are provided by the interface 300. The privacy and use information can be specifically requested by the modules of the present invention as a prerequisite to providing the requested contact information to the applications. Alternatively, this information can be voluntarily provided without request.
The next illustrated act is to determine which of the available persona information will be presented and the format in which it will be presented (act 160).
In particular, a persona may include more information than a user wishes to make available to an application. Likewise, an application may not want all of the contact information that is made available by a persona. Accordingly, tire request by the application. can be automatically matched with the available information to identify the information that will be presented. Alternatively, a user can be required to manually enter the information into the fields of the interface 300, and to explicitly 3o approve the transmission of the information, if any, that is displayed by the interface 300.

If at anytime the user wants to change the contact information that is being provided to the application, they can modify it through the interface 300 as mentioned above.
The format in which the information is presented can also be specifically requested by an application. For example, an application might request the information be provided in a V-card format, in list, or in another format.
The appropriate contact information that has been requested is then presented in the appropriate format (act 130). What is considered appropriate is generally application specific and conesponds to the application's request for information as 1o well as the persona that was selected by the user. By way of example, the appropriate contact information for an email application could include the business email address aad business name of a use, if the user has specifically selected that the business persona be used to satisfy the application's request for information.
It will be appreciated that by doing this, the user can control what information is published and used by the application. For example, the outgoing messages will include only the user's business name and email address to identify the semier.
Likewise, if the user were to select the anonymous persona for a new email, the new outgoing email would then include an anonymous email address and name that would not identify the sender ar that would only identify the sender in some anonymous way.
Although the previous acample is provided with respect to email functionality, it will be appreciated that the scope of the invention mctends to other embodiments in which contact information is utilized by other application to enable different functionality. For example, other applications may utilize the methods and interfaces of the invention include applications that use contact information to initiate a telephony session, initiate a telephone call, initiaxe a network connection, initiate a gaming session, access a website, perform a financial t«msaction, send material goods via postal mail, and so forth. These applications can be hosted by the user's computing system or by a remote computing system. ' 3o It will be appreciated that the present invention, as it has been described, overcomes many of the problems with controlling how contact information is provided to applications. In particular, the interfaces that are providui by the present application and their use can enable a user to be informed of application requests for contact information and can provide a user control over what information is gathered and how it is used by requesting applications.
COMPUTING ENVIRONMENT
It will be appreciated by those skilled in the art that the invention may be practiced in computing systems and network computing environments with various configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or prograznmable consumer electronics, network PCs, 1o minicomputers, mainframe computers, and the like. The invention may also-be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
With reference to Figure 4, an exemplary system that can be used, for example to develop aggregate user preference data and to perform many of the other acts and steps of the invention is provided. The illustrated system includes a general purpose computing device in the form of a conventional computer 420, including a processing 2o unit 421, a system memory 422, and a system bus 423 that couples various system components inchiding the system memory 422 to the processing unit 421. The system bus 423 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architechues. The system memory includes read only memory (ROM) 424 and random access memory (RAM) 425. . A basic input/output system (BIOS) 426, containing the basic routines that help t<ansfer information between elemea~ts within the computer 420, such as during start-up, may be stored in ROM 424.
The computer 420 may also include a magnetic hard disk drive 427 for reading from and writing to a magnetic hard disk 439, a magnetic disk drive 428 for 3o reading from or writing to a removable magnetic disk 429, and an optical disk drive 430 for reading from or writing to raaovable optical disk 431 such as a CD-ROM, DVD-ROM or other optical media The magnetic hard disk drive 427, magnetic disk drive 428, and optical disk drive 430 are connected to the system bus 423 by a hard disk drive interface 432, a magnetic disk drive-interface 433, and an optical drive interface 434, respectively. The drives and their associated computer-readable media 5 provide nonvolatile storage of computer-executable instructions, data structures, program modules and other data for the computer 420. Although the exemplary envimament described herein employs a magnetic hard disk 439, a removable magn~ic disk 429 and a removable optical disk 431, other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, io, digital versatile disks, Bernoulli cartridges, RAMs, ROMs, and the like.
Program code means comprising one or more program modules may be stored on the hard disk 439, magnetic disk 429, optical disk 431, ROM 424 or RAM 425, including an operating system 435, one or more application programs 436, other program modules 437, and program data 438. A user may enter commands and is information into the computer 420 through keyboard 440, pointing device 442, or other input devices (not shown), such as a microphone, joy stick, game Pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 421 through a serial port interface 446 coupled to system bus 423.
Alternatively, the input devices may be connected by other interfaces, such as a 2o parallel port, a game port or a universal serial bus (USB). A monitor 447 or another display device is also connected to system bus 423 via an interfere, such as video adapter 448. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
The computer 420 may operate in a networked environment using logical connections to one or more remote computers, such as remote computers 449a and 449b. Remote computers 449a and 449b may each be another personal computer, a server, a router, a network PC, a peer device or other common network node, and typically include many or all of the elements described above relative to the computer 420, although only memory storage devices 450a and 450b and their associated 3o application programs 436a and 436b have-been illustrated in Figure 4. The logical connections depicted in Figure 4 include a local area network (LAIC 451 and a wide area network (WAN) 452 that are presented here by way of example and not limitation. Such networking environments are commonplace in once-wide or enterprise-wide computer networks, intranets and the Intern.
When usod in a LAN networking environment, the computer 420 is connected to the local network 451 through a network interface or adapter 453. When used in a WAN networking envimnment, the computer 420 may include a modem 454, a wireless link, or other means for establishing communications over the wide area network 452, such as the Internet The modem 454, which. may be internal or external, is connected to the system bus 423 via the serial port interface 446. In a io networked environment, program modules depictod relative to the computer 420, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are acemplmy and other means of establishing communications over wide area network 452 may be used.
The present invention caa also be embodied in other specific forms without is departing from its spirit or essential characteristics. The described embodiments are to be considered in all only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims ~e to be embraced within their scope.

Claims (41)

1. ~In a computing system that is in communication with at least one application, a method for controlling how the contact information is provided to one or more applications, the method comprising:
detecting a request from an application for desired contact information;
in response to the request, selecting an appropriate contact persona from one or more possible contact personas that are available to the computing system, each contact persona comprising available contact information;
identifying at least some of the available contact information that is intended to be provided to the application in response to the request and determining an appropriate format in which the identified contact information will be presented to the application.
presenting to the user the information that is intended to be provided to the application and allowing the user to determine whether that information will actually be actually provided to the application and whether other information will be provided to the application; and providing the identified contact information in the appropriate format to the application as designated by the user.
2. ~A method as recited in claim 1, wherein each of the available contact personas correspond to a single user of the computing system.
3. ~A method as recited in claim 1, wherein selecting the appropriate contact persona occurs in response to user selection of one of the possible contact personas,
4. ~A method as recited in claim 3, wherein a listing of the possible contact personas are presented to the user for selection.
5. ~A method as recited in claim 1, wherein identifying at least some of the available contact information to be presented to the application occurs through user selection of the available contact information.
6. ~A method as recited in claim 1, wherein identifying at least some of the available contact information to be presented to the application occurs automatically in response to default settings corresponding to the appropriate contact persona.
7. ~A method as recited in claim 1, wherein identifying at least some of the available contact information to be presented to the application in response to the request includes determining what the contact information will be used for.
8. ~A method as recited in claim 1, further comprising:
determining whether the application has authorization to access the requested contact information.
9. ~A method as recited in claim 8, wherein upon determining the application has authorization to access the requested contact information, the appropriate contact persona is automatically selected the identified contact information is automatically identified and provided to the application in the appropriate format.
10. ~A method as recited in claim 8, wherein it is determined that the application has authorization based upon one or more authorizations provided in an access control list of the computing system.
11. ~A method as recited in claim 1, wherein the application requesting information is hosted on a remote system that is in communication with the computing system through the Internet.
12. ~A method as recited in claim 1, wherein the application requesting the contact information is hosted by the computing system.
13. ~A method as recited in claim 1, wherein the requested contact information includes at least one of a name and an address.
14. ~A method as recited in claim 1, wherein the available contact information corresponding to a first contact persona differs from the available contact information corresponding to a second contact persona, and even though the first and second contact personas both correspond to the same entity.
15. ~In a computing system that is in communication with at least one application, a method for controlling how the contact information is provided to one or wore applications, the method comprising:
providing an interface object for allowing a user to select a contact persona from a plurality of possible contact personas, each contact persona corresponding to a person and respective contact information about the person, wherein the respective contact information corresponding to a first contact persona differs from the available contact information corresponding to a second contact persona, even though the first and second contact personas are both associated with the same person;
in response to a user selection of a particular contact persona, displaying the respective contact information corresponding to the selected contact persona;
and enabling the user to modify the respective contact information corresponding to the selected contact persona; and upon an application seeking contact information from the computing system, providing the respective contact information corresponding to the selected contact persona.
16. A method as recited in claim 15, wherein the interface object is displayed in response to a request by the application for contact information.
17. A method as recited in claim 15, wherein the respective contact information is displayed with one or more privacy policies of the application that specify at least one of how and when the contact information will be used by the application.
18. A method as recited in claim 15, wherein the requesting application is hosted on a remote system that is in communication with the computing system through the Internet.
19. A method as recited in claim 15, wherein the requesting application is hosted by the computing system.
20. A method as recited in claim 15, wherein the requested contact information includes at least one of a name and an address.
21. A method as recited in claim 15, wherein the contact personas are associated with a logged on user of the computing system.
22. A computer program product for use in a computing system that is in communication with at least one application, the computer program product comprising one or more cod readable media having computer-executable instructions for implementing a method for controlling how the contact information is provided to one or more applications, the method comprising:

detecting a request from an application for desired contact information;
in response to the request, selecting an appropriate contact persona from one or more possible contact personas that are available to the computing system, each contact persona comprising available contact information;
identifying at least some of the available contact information that is intended to be provided to the application in response to the request and determining an appropriate format in which the identified contact information will be presented to the application;
presenting to the user the information that is intended to be provided to the application and allowing the user to determine whether that information will actually be actually provided to the application and whether other information will be provided to the application; and providing the identified contact information in the appropriate format to the application as designated by the user.
23. ~A computer program product as recited in claim 22, wherein each of the available contact personas correspond to a single user of the computing system.
24. ~A computer program product as recited in claim 22, wherein selecting the appropriate contact persona occurs in response to user selection of one of the possible contact personas.
25. ~A computer program product as recited in claim 24, wherein a listing of the possible contact personas are presented to the user for selection.
26. ~A computer program product as recited in claim 22, wherein identifying at least some of the available contact information to be presented to the application occurs through user selection of the available contact information.
27. ~A computer program product as recited in claim 22, wherein identifying at least some of the available contact information to be presented to the application occurs automatically in response to default settings corresponding to the appropriate contact persona.
28. ~A computer program product as recited in claim 22, wherein identifying at least some of the available contact information to be presented to the application in response to the request includes determining what the contact information will be used for.
29. ~A computer program product as recited in claim 22, wherein the method further comprises:
determining whether the application has authorization to access the requested contact information.
30. ~A computer program product as recited in claim 29, wherein upon determining the application has authorization to access the requested contact information, at least one of the appropriate contact persona and the identified contact~
information is automatically selected and provided to the application in the appropriate format.
31. ~A computer program product as recited in claim 29, wherein it is determined that the application has authorization based upon one or more authorizations provided in an access control list of the computing system.
32. ~A computer program product as recited in claim 22, wherein the application requesting information is hosted on a remote system that is in communication with the computing system through the Internet.
33. ~A computer program product as recited in claim 22, wherein the application requesting the contact information is hosted by the computing system.
34. ~A computer program product as recited in claim 22, wherein the requested contact information includes at least one of a name and an address.
35. ~A computer program product as recited in claim 22, wherein the available contact information corresponding to a first contact persona differs from the available contact information corresponding to a second contact persona, and even though the first and second contact personas both correspond to the same entity.
36. ~In a computing system that is in communication with at least one application, a method for controlling how the contact information is provided to one or more applications, the method comprising:
providing an interface object for allowing a user to select a contact persona from a plurality of possible contact personas, each contact persona corresponding to a person and respective contact information about the person, wherein the respective contact information corresponding to a first contact persona differs from the available contact information corresponding to a second contact persona, even though the first and second contact personas are both associated with the same person;
in response to a user selection of a particular contact persona, displaying the respective contact information corresponding to the selected contact persona;
and enabling the user to modify the respective contact information corresponding to the selected contact persona; and upon an application seeking contact information from the computing system, providing the respective contact information corresponding to the selected contact persona.
37. A computer program product as recited in claim 36, wherein the interface object is displayed in response to a request by the application for contact information.
38. A computer program product as recited in claim 36, wherein the respective contact information is displayed with one or more privacy policies of the application that specify at least one of how and when the contact information will be used by the application.
39. A computer program product as recited in claim 36, wherein the requesting application is hosted on a remote system that is in communication with the computing system through the Internet.
40. One or more computer-readable media having a data structure thereon that represents an application programming interface configured to control the presentation of a person's contact information to a requesting application, the data structure comprising:
computer-executable instructions for accessing a plurality of contact personas, each contact persona comprising contact information corresponding to tho person;
computer-executable instructions for receiving a request from an application for contact information about the person;

computer-executable instructions for providing appropriate contact information to the application and as specified by an appropriate one of the contact personas, wherein the appropriate contact persona is determined in response to user input selecting the contact persona.
41. A method for controlling how the contact information is provided to an application, the method comprising:
the application requesting contact information from a computing system having access to the contact information;
receiving the contact information from the computing system, wherein the contact information was identified and selected by the computing system in response to a user selecting an appropriate contact persona from one or more possible contact personas that are available to the computing system, each contact persona comprising available contact information defining the user in a different way;
wherein prior to receiving the contact information, the available contact information corresponding to the selected persona is displayed to the user in such a meaner as to allow the user to select which of the corresponding available information will be provided to the application; and providing the contact information from the corresponding available contact information to the application as selected by the user.
CA002501702A 2003-10-23 2004-07-30 Information picker Abandoned CA2501702A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/692,257 US7549125B2 (en) 2003-10-23 2003-10-23 Information picker
US10/692,257 2003-10-23
PCT/US2004/024637 WO2005045587A2 (en) 2003-10-23 2004-07-30 Information picker

Publications (1)

Publication Number Publication Date
CA2501702A1 true CA2501702A1 (en) 2005-04-23

Family

ID=34522073

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002501702A Abandoned CA2501702A1 (en) 2003-10-23 2004-07-30 Information picker

Country Status (16)

Country Link
US (1) US7549125B2 (en)
EP (1) EP1576450A4 (en)
JP (1) JP4783293B2 (en)
KR (1) KR101120704B1 (en)
CN (1) CN101103325B (en)
AU (1) AU2004279191B2 (en)
BR (1) BRPI0406373A (en)
CA (1) CA2501702A1 (en)
MX (1) MXPA05006640A (en)
MY (1) MY146757A (en)
NO (1) NO20052047L (en)
NZ (1) NZ540115A (en)
RU (1) RU2371755C2 (en)
TW (1) TWI339341B (en)
WO (1) WO2005045587A2 (en)
ZA (1) ZA200503150B (en)

Families Citing this family (57)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636719B2 (en) * 2002-12-19 2009-12-22 Microsoft Corporation Contact schema
US7313760B2 (en) * 2002-12-19 2007-12-25 Microsoft Corporation Contact picker
US7418663B2 (en) * 2002-12-19 2008-08-26 Microsoft Corporation Contact picker interface
US7360172B2 (en) 2002-12-19 2008-04-15 Microsoft Corporation Contact controls
US7240298B2 (en) * 2002-12-19 2007-07-03 Microsoft Corporation Contact page
US7360174B2 (en) 2002-12-19 2008-04-15 Microsoft Corporation Contact user interface
US7953759B2 (en) 2004-02-17 2011-05-31 Microsoft Corporation Simplifying application access to schematized contact data
WO2006007194A1 (en) * 2004-06-25 2006-01-19 Personasearch, Inc. Dynamic search processor
US7430719B2 (en) 2004-07-07 2008-09-30 Microsoft Corporation Contact text box
JP3835470B2 (en) * 2004-09-29 2006-10-18 コニカミノルタビジネステクノロジーズ株式会社 Display control apparatus and image forming apparatus provided with the display control apparatus
US8038535B2 (en) * 2005-05-17 2011-10-18 Electronic Arts Inc. Collaborative online gaming system and method
US20070156682A1 (en) * 2005-12-28 2007-07-05 Microsoft Corporation Personalized user specific files for object recognition
US8256013B1 (en) * 2006-12-22 2012-08-28 Symantec Corporation Method and apparatus for dynamic creation of persona
US10452763B2 (en) * 2007-03-08 2019-10-22 Oath Inc. Autocomplete for integrating diverse methods of electronic communication
JP2008257669A (en) * 2007-03-09 2008-10-23 Ripplex Inc Information terminal, transmission terminal and server
US8949325B1 (en) * 2007-06-29 2015-02-03 Symantec Corporation Dynamic discovery and utilization of current context information
US8726165B1 (en) * 2007-11-01 2014-05-13 Google Inc. Methods for auto-completing contact entry on mobile devices
US9241063B2 (en) 2007-11-01 2016-01-19 Google Inc. Methods for responding to an email message by call from a mobile device
US8676901B1 (en) 2007-11-01 2014-03-18 Google Inc. Methods for transcoding attachments for mobile devices
US9319360B2 (en) 2007-11-01 2016-04-19 Google Inc. Systems and methods for prefetching relevant information for responsive mobile email applications
US20090119678A1 (en) 2007-11-02 2009-05-07 Jimmy Shih Systems and methods for supporting downloadable applications on a portable client device
US8650474B2 (en) * 2008-02-29 2014-02-11 Usablenet Inc. Methods for web content optimization in single page display environments and systems thereof
US20090228815A1 (en) * 2008-03-10 2009-09-10 Palm, Inc. Techniques for managing interfaces based on user circumstances
US8892658B2 (en) * 2008-04-07 2014-11-18 Microsoft Corporation Break-through mechanism for personas associated with a single device
CN104331211B (en) 2008-09-29 2018-01-16 费希尔-罗斯蒙特系统公司 For configuring the dynamic user interface with management process control system
US8924156B2 (en) * 2009-03-26 2014-12-30 Nokia Corporation Method, apparatus, computer program and user interface
TWI485634B (en) * 2010-11-30 2015-05-21 Hon Hai Prec Ind Co Ltd System and method for identifying difference of two images
US9116728B2 (en) * 2010-12-21 2015-08-25 Microsoft Technology Licensing, Llc Providing a persona-based application experience
JP6073802B2 (en) * 2010-12-22 2017-02-01 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Creating an access control policy based on consumer privacy preferences
US10048854B2 (en) * 2011-01-31 2018-08-14 Oracle International Corporation Drag and drop interaction between components of a web application
US8572505B2 (en) 2011-01-31 2013-10-29 Oracle International Corporation Automatically testing a web application that has independent display trees
US9167099B2 (en) 2011-09-07 2015-10-20 Elwha Llc Computational systems and methods for identifying a communications partner
US9159055B2 (en) 2011-09-07 2015-10-13 Elwha Llc Computational systems and methods for identifying a communications partner
US10546295B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9195848B2 (en) 2011-09-07 2015-11-24 Elwha, Llc Computational systems and methods for anonymized storage of double-encrypted data
US20130060852A1 (en) * 2011-09-07 2013-03-07 Elwha LLC, a limited liability company of the State of Delaware Computational systems and methods for regulating information flow during interactions
US10523618B2 (en) 2011-09-07 2019-12-31 Elwha Llc Computational systems and methods for identifying a communications partner
US9690853B2 (en) * 2011-09-07 2017-06-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US10606989B2 (en) 2011-09-07 2020-03-31 Elwha Llc Computational systems and methods for verifying personal information during transactions
US9928485B2 (en) * 2011-09-07 2018-03-27 Elwha Llc Computational systems and methods for regulating information flow during interactions
US9141977B2 (en) 2011-09-07 2015-09-22 Elwha Llc Computational systems and methods for disambiguating search terms corresponding to network members
US9491146B2 (en) 2011-09-07 2016-11-08 Elwha Llc Computational systems and methods for encrypting data for anonymous storage
US9432190B2 (en) 2011-09-07 2016-08-30 Elwha Llc Computational systems and methods for double-encrypting data for subsequent anonymous storage
US9747561B2 (en) 2011-09-07 2017-08-29 Elwha Llc Computational systems and methods for linking users of devices
US10546306B2 (en) 2011-09-07 2020-01-28 Elwha Llc Computational systems and methods for regulating information flow during interactions
US8887092B2 (en) 2011-09-12 2014-11-11 Microsoft Corporation Contact selector that facilitates granular sharing of contact data
WO2013124850A1 (en) * 2012-02-24 2013-08-29 Cellrox Ltd. Systems and methods for sharing and switching between personas on mobile technology platforms
RU2486585C1 (en) * 2012-05-16 2013-06-27 Общество С Ограниченной Ответственностью "Яндекс" System and method to collect and control profiles of internet users
EP2865212B1 (en) * 2012-06-22 2018-10-24 BlackBerry Limited Presenting email addresses for selection as mobile application login
WO2014098781A1 (en) * 2012-12-19 2014-06-26 Noshchenko Igor Vladimirovych Method for modifying game parameters of digital games
US10726410B2 (en) * 2014-03-31 2020-07-28 Truist Bank Web page action guidance system
US9776091B1 (en) 2014-05-16 2017-10-03 Electronic Arts Inc. Systems and methods for hardware-based matchmaking
US9993735B2 (en) 2016-03-08 2018-06-12 Electronic Arts Inc. Multiplayer video game matchmaking optimization
US10729975B1 (en) 2016-03-30 2020-08-04 Electronic Arts Inc. Network connection selection processing system
US10286327B2 (en) 2016-10-21 2019-05-14 Electronic Arts Inc. Multiplayer video game matchmaking system and methods
US10091281B1 (en) 2016-12-01 2018-10-02 Electronics Arts Inc. Multi-user application host-system selection system
US11044213B2 (en) * 2017-12-19 2021-06-22 Nice Ltd. Systems and methods for invisible identification of agents participating in on-line communication sessions

Family Cites Families (124)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5214756A (en) 1989-03-10 1993-05-25 International Business Machines Corporation Direct manipulation of icons via conversational linking
WO1994017481A1 (en) 1993-01-22 1994-08-04 Taligent, Inc. Business card system
JP3484718B2 (en) 1993-04-19 2004-01-06 株式会社日立製作所 Computer system operation management system
US5913032A (en) 1994-04-04 1999-06-15 Inprise Corporation System and methods for automatically distributing a particular shared data object through electronic mail
US6008799A (en) 1994-05-24 1999-12-28 Microsoft Corporation Method and system for entering data using an improved on-screen keyboard
US5767897A (en) 1994-10-31 1998-06-16 Picturetel Corporation Video conferencing system
US5873108A (en) 1995-02-27 1999-02-16 Fuga Corporation Personal information manager information entry allowing for intermingling of items belonging to different categories within a single unified view
US5737726A (en) 1995-12-12 1998-04-07 Anderson Consulting Llp Customer contact mangement system
US5923848A (en) 1996-05-31 1999-07-13 Microsoft Corporation System and method for resolving names in an electronic messaging environment
US5909679A (en) 1996-11-08 1999-06-01 At&T Corp Knowledge-based moderator for electronic mail help lists
JP3889466B2 (en) 1996-11-25 2007-03-07 ソニー株式会社 Text input device and method
US6209005B1 (en) 1996-12-23 2001-03-27 Apple Computer, Inc. Method and apparatus for generating and linking documents to contacts in an organizer
US6014135A (en) 1997-04-04 2000-01-11 Netscape Communications Corp. Collaboration centric document processing environment using an information centric visual user interface and information presentation method
US6701376B1 (en) 1997-06-19 2004-03-02 International Business Machines Corporation Web server enabling browser access to HTML and Non-HTML documents
US5870744A (en) 1997-06-30 1999-02-09 Intel Corporation Virtual people networking
US6278991B1 (en) 1997-08-22 2001-08-21 Sap Aktiengesellschaft Browser for hierarchical structures
US6269369B1 (en) 1997-11-02 2001-07-31 Amazon.Com Holdings, Inc. Networked personal contact manager
US5896321A (en) 1997-11-14 1999-04-20 Microsoft Corporation Text completion system for a miniature computer
US6216122B1 (en) 1997-11-19 2001-04-10 Netscape Communications Corporation Electronic mail indexing folder having a search scope and interval
US5950193A (en) 1997-12-16 1999-09-07 Microsoft Corporation Interactive records and groups of records in an address book database
IL137704A0 (en) 1998-02-05 2001-10-31 A Pty Ltd System for handling electronic mail
US6332154B2 (en) 1998-09-11 2001-12-18 Genesys Telecommunications Laboratories, Inc. Method and apparatus for providing media-independent self-help modules within a multimedia communication-center customer interface
US6065012A (en) 1998-02-27 2000-05-16 Microsoft Corporation System and method for displaying and manipulating user-relevant data
US6339826B2 (en) 1998-05-05 2002-01-15 International Business Machines Corp. Client-server system for maintaining a user desktop consistent with server application user access permissions
US6247043B1 (en) 1998-06-11 2001-06-12 International Business Machines Corporation Apparatus, program products and methods utilizing intelligent contact management
US6208339B1 (en) 1998-06-19 2001-03-27 International Business Machines Corporation User-interactive data entry display system with entry fields having distinctive and changeable autocomplete
US5999208A (en) 1998-07-15 1999-12-07 Lucent Technologies Inc. System for implementing multiple simultaneous meetings in a virtual reality mixed media meeting room
US6115709A (en) * 1998-09-18 2000-09-05 Tacit Knowledge Systems, Inc. Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions
US7509349B2 (en) * 1998-10-01 2009-03-24 Onepin, Inc. Method and apparatus for storing and retrieving business contact information in a computer system
US6845370B2 (en) * 1998-11-12 2005-01-18 Accenture Llp Advanced information gathering for targeted activities
US6564327B1 (en) * 1998-12-23 2003-05-13 Worldcom, Inc. Method of and system for controlling internet access
US6411961B1 (en) 1999-01-15 2002-06-25 Metaedge Corporation Apparatus for providing a reverse star schema data model
US6883000B1 (en) 1999-02-12 2005-04-19 Robert L. Gropper Business card and contact management system
JP2000250830A (en) * 1999-03-03 2000-09-14 Casio Comput Co Ltd Electronic mail preparing device, computer, electronic mail preparing method, and medium stored with electronic mail preparing program
US6820204B1 (en) * 1999-03-31 2004-11-16 Nimesh Desai System and method for selective information exchange
US20030069874A1 (en) * 1999-05-05 2003-04-10 Eyal Hertzog Method and system to automate the updating of personal information within a personal information management application and to synchronize such updated personal information management applications
US6212534B1 (en) 1999-05-13 2001-04-03 X-Collaboration Software Corp. System and method for facilitating collaboration in connection with generating documents among a plurality of operators using networked computer systems
US6668281B1 (en) 1999-06-10 2003-12-23 General Interactive, Inc. Relationship management system and method using asynchronous electronic messaging
US6539379B1 (en) 1999-08-23 2003-03-25 Oblix, Inc. Method and apparatus for implementing a corporate directory and service center
GB2354089B (en) * 1999-09-08 2003-09-17 Sony Uk Ltd Artificial intelligence user profiling
US6816719B1 (en) * 1999-11-03 2004-11-09 Nokia Corporation Method and system for making wireless terminal profile information accessible to a network
US6895388B1 (en) 1999-11-05 2005-05-17 Ford Motor Company Communication schema of online system and method of locating consumer product in the enterprise production pipeline
US6609108B1 (en) 1999-11-05 2003-08-19 Ford Motor Company Communication schema of online system and method of ordering consumer product having specific configurations
US20020055351A1 (en) * 1999-11-12 2002-05-09 Elsey Nicholas J. Technique for providing personalized information and communications services
US6870921B1 (en) * 1999-11-12 2005-03-22 Metro One Telecommunications, Inc. Enhanced directory assistance service providing individual or group directories
US6571235B1 (en) 1999-11-23 2003-05-27 Accenture Llp System for providing an interface for accessing data in a discussion database
US6557004B1 (en) 2000-01-06 2003-04-29 Microsoft Corporation Method and apparatus for fast searching of hand-held contacts lists
US6581059B1 (en) * 2000-01-24 2003-06-17 International Business Machines Corporation Digital persona for providing access to personal information
US6678685B2 (en) 2000-01-26 2004-01-13 Familytime.Com, Inc. Integrated household management system and method
US6460074B1 (en) 2000-02-10 2002-10-01 Martin E. Fishkin Electronic mail system
US6871140B1 (en) * 2000-02-25 2005-03-22 Costar Group, Inc. System and method for collection, distribution, and use of information in connection with commercial real estate
US6581062B1 (en) 2000-03-02 2003-06-17 Nimble Technology, Inc. Method and apparatus for storing semi-structured data in a structured manner
US6791583B2 (en) 2000-03-09 2004-09-14 Sun Microsystems, Inc. System and method for providing spatially distributed device interaction
WO2001075724A1 (en) 2000-03-31 2001-10-11 Persona, Inc. Persona data structure and system for managing and distributing privacy-controlled data
US6661434B1 (en) 2000-04-13 2003-12-09 International Business Machines Corporation Method and system for displaying status of critical indicators on diverse display devices
US6564213B1 (en) 2000-04-18 2003-05-13 Amazon.Com, Inc. Search query autocompletion
US6952805B1 (en) 2000-04-24 2005-10-04 Microsoft Corporation System and method for automatically populating a dynamic resolution list
US6829607B1 (en) 2000-04-24 2004-12-07 Microsoft Corporation System and method for facilitating user input by automatically providing dynamically generated completion information
AU2001261084A1 (en) 2000-04-27 2001-11-07 Brio Technology, Inc. Method and apparatus for processing jobs on an enterprise-wide computer system
US6959340B1 (en) 2000-05-31 2005-10-25 Sun Microsystems, Inc. Platform independent business to business messenger in an enterprise computer system
US6753889B1 (en) 2000-05-31 2004-06-22 Sun Microsystems, Inc. Platform independent business to business messenger adapter generation tool
US7130853B2 (en) 2000-06-06 2006-10-31 Fair Isaac Corporation Datamart including routines for extraction, accessing, analyzing, transformation of data into standardized format modeled on star schema
US6781608B1 (en) 2000-06-30 2004-08-24 America Online, Inc. Gradual image display
US6699125B2 (en) 2000-07-03 2004-03-02 Yahoo! Inc. Game server for use in connection with a messenger server
WO2002019226A1 (en) 2000-09-01 2002-03-07 Togethersoft Corporation Methods and systems for optimizing resource allocation based on data mined from plans created from a workflow
US20020029254A1 (en) * 2000-09-06 2002-03-07 Davis Terry L. Method and system for managing personal information
US6988128B1 (en) 2000-09-27 2006-01-17 International Business Machines Corporation Calendar events and calendar-driven application technique
WO2002028079A2 (en) 2000-09-28 2002-04-04 Accessline Communications Corporation User configurable system for handling incoming calls to users having multiple destinations adresses
US6957198B2 (en) * 2000-12-07 2005-10-18 International Business Machines Corporation Use of persona object in electronic transactions
US20020120864A1 (en) * 2000-12-13 2002-08-29 Wu Jackie Zhanhong Automatable secure submission of confidential user information over a computer network
US6907580B2 (en) 2000-12-14 2005-06-14 Microsoft Corporation Selection paradigm for displayed user interface
KR100706503B1 (en) 2000-12-19 2007-04-10 엘지전자 주식회사 Method of Memory Field Using
US6985924B2 (en) 2000-12-22 2006-01-10 Solomio Corporation Method and system for facilitating mediated communication
US6701348B2 (en) 2000-12-22 2004-03-02 Goodcontacts.Com Method and system for automatically updating contact information within a contact database
US6983310B2 (en) 2000-12-29 2006-01-03 International Business Machines Corporation System and method for providing search capabilties on a wireless device
US6828988B2 (en) 2001-02-27 2004-12-07 Microsoft Corporation Interactive tooltip
US20030041076A1 (en) 2001-03-14 2003-02-27 Lucovsky Mark H. Schema-based services for identity-based access to calendar data
US7302634B2 (en) 2001-03-14 2007-11-27 Microsoft Corporation Schema-based services for identity-based data access
US20030050911A1 (en) 2001-03-14 2003-03-13 Mark Lucovsky Schema-based services for identity-based access to profile data
US20020143961A1 (en) * 2001-03-14 2002-10-03 Siegel Eric Victor Access control protocol for user profile management
US20030041065A1 (en) 2001-03-14 2003-02-27 Mark Lucovsky Schema-based services for identity-based access to contacts data
US7209951B2 (en) 2001-03-20 2007-04-24 Bernel Goldberg Method and system for modifying the content of e-mail transmissions based on customization settings
US7143190B2 (en) 2001-04-02 2006-11-28 Irving S. Rappaport Method and system for remotely facilitating the integration of a plurality of dissimilar systems
US7159207B2 (en) 2001-04-09 2007-01-02 Sun Microsystems, Inc. Method and apparatus for accessing related computer objects
US20020156895A1 (en) * 2001-04-20 2002-10-24 Brown Michael T. System and method for sharing contact information
WO2002091186A1 (en) * 2001-05-08 2002-11-14 Ipool Corporation Privacy protection system and method
US7162474B1 (en) 2001-05-10 2007-01-09 Nortel Networks Limited Recipient controlled contact directories
US7010599B2 (en) 2001-05-21 2006-03-07 Sridhar Shrinivasan System using access information set by a user to allow another user to access updated portion of contact and personal information of the user
US7096232B2 (en) 2001-06-06 2006-08-22 International Business Machines Corporation Calendar-enhanced directory searches including dynamic contact information
US7185290B2 (en) 2001-06-08 2007-02-27 Microsoft Corporation User interface for a system and process for providing dynamic communication access and information awareness in an interactive peripheral display
US20020186257A1 (en) 2001-06-08 2002-12-12 Cadiz Jonathan J. System and process for providing dynamic communication access and information awareness in an interactive peripheral display
EP1403779A1 (en) 2001-06-22 2004-03-31 Celestar Lexico-Sciences, Inc. Structured data processing apparatus
JP2003006116A (en) * 2001-06-27 2003-01-10 Toyo Commun Equip Co Ltd E-mail system
EP1459222A2 (en) 2001-07-25 2004-09-22 Koninklijke Philips Electronics N.V. Method of and interactive display for exchanging a message
US7043471B2 (en) 2001-08-03 2006-05-09 Overture Services, Inc. Search engine account monitoring
US6820075B2 (en) 2001-08-13 2004-11-16 Xerox Corporation Document-centric system with auto-completion
US6990495B1 (en) 2001-09-05 2006-01-24 Bellsouth Intellectual Property Corporation System and method for finding persons in a corporate entity
US6993712B2 (en) 2001-09-28 2006-01-31 Siebel Systems, Inc. System and method for facilitating user interaction in a browser environment
US7343365B2 (en) 2002-02-20 2008-03-11 Microsoft Corporation Computer system architecture for automatic context associations
JP3946553B2 (en) * 2002-03-20 2007-07-18 シャープ株式会社 E-mail creation device, e-mail creation program, and recording medium
US7191210B2 (en) 2002-05-01 2007-03-13 James Grossman Computer implemented system and method for registering websites and for displaying registration indicia in a search results list
US6947929B2 (en) 2002-05-10 2005-09-20 International Business Machines Corporation Systems, methods and computer program products to determine useful relationships and dimensions of a database
US20030210265A1 (en) 2002-05-10 2003-11-13 Haimberg Nadav Y. Interactive chat messaging
US7113941B2 (en) 2002-06-05 2006-09-26 Sap Aktiengesellschaft Database access mechanisms for a computer user interface
US7076498B2 (en) 2002-06-10 2006-07-11 International Business Machines Corporation Method and apparatus for processing user input selecting images from a web page in a data processing system
US7337191B2 (en) 2002-07-27 2008-02-26 Siemens Building Technologies, Inc. Method and system for obtaining service related information about equipment located at a plurality of sites
US7185271B2 (en) 2002-08-20 2007-02-27 Hewlett-Packard Development Company, L.P. Methods and systems for implementing auto-complete in a web page
CA2409788A1 (en) 2002-10-25 2004-04-25 Ibm Canada Limited-Ibm Canada Limitee Architecture for dynamically monitoring computer application data
US20040093334A1 (en) * 2002-11-13 2004-05-13 Stephen Scherer Profile management system
WO2004046867A2 (en) * 2002-11-18 2004-06-03 America Online, Inc. People lists
US20040103364A1 (en) 2002-11-25 2004-05-27 Dornback Jason Robert Method of an action occurring as a result of dragging and dropping a defined object within a web page
US20040117322A1 (en) * 2002-12-17 2004-06-17 Nokia Corporation System, method and computer program product for providing profile information
US7418663B2 (en) 2002-12-19 2008-08-26 Microsoft Corporation Contact picker interface
US7068768B2 (en) 2003-01-29 2006-06-27 America Online, Inc. Method for populating a caller's information to a host-based address book
US20040235520A1 (en) 2003-05-20 2004-11-25 Cadiz Jonathan Jay Enhanced telephony computer user interface allowing user interaction and control of a telephone using a personal computer
US20040243935A1 (en) 2003-05-30 2004-12-02 Abramovitch Daniel Y. Systems and methods for processing instrument data
US7139774B2 (en) 2003-06-12 2006-11-21 International Business Machines Corporation Singleton abstract model correspondence to multiple physical models
US20040260948A1 (en) * 2003-06-23 2004-12-23 Tatsuhiko Miyata Server and control method for managing permission setting of personal information disclosure
US7743391B2 (en) 2003-07-15 2010-06-22 Lsi Corporation Flexible architecture component (FAC) for efficient data integration and information interchange using web services
WO2005013079A2 (en) * 2003-08-01 2005-02-10 Dateplay.Com, Inc. Web based dating service with weighted interests matching and filter for filtering potential friends/mates using physical and/or personality attractiveness criteria
US20040107283A1 (en) 2003-10-06 2004-06-03 Trilibis Inc. System and method for the aggregation and matching of personal information
US7814127B2 (en) 2003-11-20 2010-10-12 International Business Machines Corporation Natural language support for database applications
US7149731B2 (en) 2003-11-26 2006-12-12 International Business Machines Corporation Methods, systems and articles of manufacture for abstract query building with selectability of aggregation operations and grouping
US7953759B2 (en) 2004-02-17 2011-05-31 Microsoft Corporation Simplifying application access to schematized contact data

Also Published As

Publication number Publication date
WO2005045587A2 (en) 2005-05-19
TWI339341B (en) 2011-03-21
CN101103325A (en) 2008-01-09
MXPA05006640A (en) 2005-08-16
JP2007519079A (en) 2007-07-12
AU2004279191A8 (en) 2008-10-02
WO2005045587A3 (en) 2007-08-16
JP4783293B2 (en) 2011-09-28
NO20052047D0 (en) 2005-04-26
RU2371755C2 (en) 2009-10-27
AU2004279191B2 (en) 2009-12-17
US20050091072A1 (en) 2005-04-28
AU2004279191A9 (en) 2008-10-09
EP1576450A4 (en) 2012-05-23
TW200516415A (en) 2005-05-16
MY146757A (en) 2012-09-14
KR101120704B1 (en) 2012-03-23
EP1576450A2 (en) 2005-09-21
NZ540115A (en) 2009-04-30
KR20060111359A (en) 2006-10-27
CN101103325B (en) 2010-06-23
BRPI0406373A (en) 2005-08-09
RU2005120232A (en) 2006-01-20
US7549125B2 (en) 2009-06-16
NO20052047L (en) 2005-08-16
AU2004279191A1 (en) 2005-06-23
ZA200503150B (en) 2007-12-27

Similar Documents

Publication Publication Date Title
US7549125B2 (en) Information picker
US9710642B2 (en) Methods, systems, and computer program products for recovering a password using user-selected third party authorization
US7606821B2 (en) Method and system for preventing fraudulent activities
US20190109835A1 (en) User authentication using unique hidden identifiers
US7413085B2 (en) Techniques for displaying emails listed in an email inbox
US9015205B2 (en) Identity management user experience
US7487213B2 (en) Techniques for authenticating email
US7422115B2 (en) Techniques for to defeat phishing
US20050278544A1 (en) Removable data storage medium and associated marketing interface
US20090174551A1 (en) Internet activity evaluation system
US20080229383A1 (en) Credential categorization
US20120023332A1 (en) System and method for private social networking
US7289993B2 (en) Method and agent for managing profile information
US7984498B2 (en) Methods and apparatuses for selecting privileges for use during a data collaboration session
KR100394459B1 (en) Method of servicing combined on-line spaces for closed small community and its individual user by way of dual ID system
Smith Connecting and Communicating on the Web

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued

Effective date: 20130924